Information security is part of every IT professional’s job. Hackers are constantly trying to compromise your networks, steal sensitive data, and overwhelm your systems. Planning, implementing, enforcing, or even removing security are tasks we all do to keep users and systems safe. Performing these tasks properly and in alignment with industry best practices is critical to virtually every technology role, from decision maker to developer to operator.
This scenario-based course focuses on computer security as an applied process across job roles and industries. The course also helps to prepare students for achieving the Certified Information Systems Security Professional (CISSP) certification. CISSP is widely regarded as the most valuable vendor-neutral credential a computer security professional can hold. It is frequently identified as a prerequisite for security jobs across all industries including security design, implementation, maintenance, policy development, and management of secured systems, process/procedures, policies, applications and networks.
Learning Objectives
After completing this course, you will have an understanding of:
- Security Architecture and Design
- Implementing Governance Compliance Strategies and Risk Management
- Security Access Control models, methods and implementations.
- Disaster Recovery Planning
- Cryptography Methodology
- Operations in Information Security
- Legal, Regulations, Investigations and Compliance in Security
- Vulnerability Assessment
- Continuous Security Lifecycle
- Physical and Software Development Security
- Network Security Considerations
Framework Connections
- Cyberspace Intelligence
- Design and Development
- Implementation and Operation
- Oversight and Governance
- Protection and Defense
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Cyber Defense Analysis
- Risk Management
- Strategic Planning and Policy
- Systems Analysis
- Threat Analysis
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.